10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
0.121 Low
EPSS
Percentile
95.4%
The remote host is missing the patch for the advisory SuSE-SA:2004:006 (xf86/XFree86).
XFree86 is an open source X Window System implementation that acts as a client-server-based API between different hardware components like display, mouse, keyboard and so on.
Several buffer overflows were found in the fontfile code that handles a user-supplied ‘fonts.alias’ file. The file is processed with root privileges and therefore a successful exploitation of these bugs leads to local root access.
There is no known workaround.
Please download the update package for your distribution and verify its integrity by the methods listed in section 3) of this announcement.
Then, to apply the update use the command ‘rpm -Fhv file.rpm’.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# This plugin text was extracted from SuSE Security Advisory SuSE-SA:2004:006
#
if ( ! defined_func("bn_random") ) exit(0);
include('deprecated_nasl_level.inc');
include('compat.inc');
if(description)
{
script_id(13824);
script_version("1.15");
script_cve_id("CVE-2004-0083", "CVE-2004-0084", "CVE-2004-0106");
name["english"] = "SuSE-SA:2004:006: xf86/XFree86";
script_name(english:name["english"]);
script_set_attribute(attribute:"synopsis", value:
"The remote host is missing a vendor-supplied security patch" );
script_set_attribute(attribute:"description", value:
"The remote host is missing the patch for the advisory SuSE-SA:2004:006 (xf86/XFree86).
XFree86 is an open source X Window System implementation that acts
as a client-server-based API between different hardware components
like display, mouse, keyboard and so on.
Several buffer overflows were found in the fontfile code that handles
a user-supplied 'fonts.alias' file. The file is processed with root
privileges and therefore a successful exploitation of these bugs leads
to local root access.
There is no known workaround.
Please download the update package for your distribution and verify its
integrity by the methods listed in section 3) of this announcement.
Then, to apply the update use the command 'rpm -Fhv file.rpm'." );
script_set_attribute(attribute:"solution", value:
"http://www.suse.de/security/2004_06_xf86.html" );
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_attribute(attribute:"plugin_publication_date", value: "2004/07/25");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_end_attributes();
summary["english"] = "Check for the version of the xf86/XFree86 package";
script_summary(english:summary["english"]);
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
family["english"] = "SuSE Local Security Checks";
script_family(english:family["english"]);
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/SuSE/rpm-list");
exit(0);
}
include("rpm.inc");
if ( rpm_check( reference:"xf86-4.2.0-257", release:"SUSE8.0") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"xf86-4.2.0-257", release:"SUSE8.1") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"XFree86-4.3.0-120", release:"SUSE8.2") )
{
security_hole(0);
exit(0);
}
if ( rpm_check( reference:"XFree86-4.3.0.1-46", release:"SUSE9.0") )
{
security_hole(0);
exit(0);
}
if (rpm_exists(rpm:"xf86-", release:"SUSE8.0")
|| rpm_exists(rpm:"xf86-", release:"SUSE8.1")
|| rpm_exists(rpm:"xf86-", release:"SUSE8.2")
|| rpm_exists(rpm:"xf86-", release:"SUSE9.0") )
{
set_kb_item(name:"CVE-2004-0083", value:TRUE);
set_kb_item(name:"CVE-2004-0084", value:TRUE);
set_kb_item(name:"CVE-2004-0106", value:TRUE);
}